Analysis

  • max time kernel
    11s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    18-02-2025 19:31

General

  • Target

    quarantine/random.html

  • Size

    5KB

  • MD5

    64860346535febeff11c67fd1a72e8d6

  • SHA1

    3c803e7aa59264ba66e77481c8313b40b8f6904c

  • SHA256

    c3bc119b29f9446f877c486632007075e941650b199f8e83a6b396c56001423d

  • SHA512

    439a818205138e69a2f69403cc0331f68b40ee5e32203ffb279ca7f161058ecf9fdd9bb5c4776d6d5382d3fc8690e1941c181c0dbbca9aea1734f41de4b55d41

  • SSDEEP

    96:1j9jwIjYj5jDK/D5DMF+C8tZqXKHvpIkdNzrRN9PaQxJbK5hnx/IR:1j9jhjYj9K/Vo+n+aHvFdNzrX9ieJenu

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\quarantine\random.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2424
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2424 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2072

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3c07bb8f3b3a81beb996bc75b029a897

    SHA1

    0c1fd32721bc91ecba00cb028096ced13628f0a0

    SHA256

    9452889b819619a191f5811d81fa9555b107eea3dafbc22e5a63329aafeb1e7c

    SHA512

    d6941c15c734a5ffe9dedeccffc33004143bee8d42c937f0177e2fe37d936729bb9ae62c1ab6ea4eb1273bdf5b11ce8234f3dbc129614a12d8c7436993626dbb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    66aadd41898b39fb53bef1aa92766455

    SHA1

    67af417fe600e30852f09eb30cfe65e55d09c0de

    SHA256

    e17ead9db6b06071f459295de6bd5686c89c4653059735a9a83bdbaf31b22829

    SHA512

    262caeb73891486e2082c02a4a2fcc4f5334729ca21162ec98c9fd4d3c2786293cadb6e3e9924bdbbf8fe0858934e15c4e4dee9f23574234b153c28d70e90c81

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    deb533abd3ae0aacc1f49a38bd5df059

    SHA1

    c101ad51f61308d742da77ccaba0a3f4f8baef49

    SHA256

    46b4fc2ebfcbde95525f954ced72f8b7cad461bdaf3953bc6d8b0ed43cbb2fb7

    SHA512

    3ca2cf25292ce9026dce0c5442d50951d36575f2b8dfcb2f9832944d2588974a2afdcd8e463044d32f8eac46ceba0c88742165adb9767945e81538de1ff2b248

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e9723994843e4ba09035ebf7b51ccbcf

    SHA1

    bdd60b0209e42d1af81da2f8d8b90d76a049cbfe

    SHA256

    1858cd414cf22f2e446726af19351b0ab8d465de6d23ff2c6f21fb976dbcccd8

    SHA512

    8e3f908efd6b62c03c232a2c302867daf3ee30358ae9b490fdd0580f360ac5be87c2ede215339f44066a84bb01bb9f02c10b665a3337328a98f2a9abf6679b62

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9cfb10c74b50302aaffccb9bf36b35e4

    SHA1

    3e81914904d046228ff6924ab102e70185e10142

    SHA256

    46b6a77b4676e212161ea3094d87a5cf3a20567ca81f5fb8f37835bb10a2690b

    SHA512

    f62c6a024cca17205cfef8b57acffa525283ebf3afda2d9e695e1e8b6267465aedd72a2cf13db7c1af8d005429a07abd67422b08a0ba24570a9ff63a711a1bbc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    31ea1674bef220373da84e3791318006

    SHA1

    c1e30fa2a5f870ff09adb616d391da308a4ad0e0

    SHA256

    029ebee021e00dbd732bd63d53db3673120ebe359bb17cdbb4d2abb01c75519a

    SHA512

    98d77045eef01bc6e4eec3c5e332fd1a562b3fadf1f17d5c376f03743dfb3e8041b45270aeb6d830f784ba2ace117beeae66135bcbc27e87e3516abbd588ead7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    491d725dededde5b4d2ab956546749be

    SHA1

    82fb70084f2b563850472bc320ebf3bad06bfe77

    SHA256

    21f0c2a0ad341a823775e7d5e40f5f7c342f139055105e18137a0945ebd9389e

    SHA512

    0922855aac4ca2cb305f0b8a106f4a80d328dd23f887107c39d93b7a8ef0fd4fb1172b4887d0b82ab74e4e2c2e8a67e8e44cad50af362c25e8bb4920b833e06f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f886d5cd307c7908d1d467b8440c93be

    SHA1

    e3c760f3605109a2c1c2684a333e9069d5119b72

    SHA256

    be13f88ae908bd84afecee3becc64e5c1bd2931ae26ce1738b42d95789a7a431

    SHA512

    d25bc1bcdf0e6ca1dc232e3d3e87f13059f2f398faded0d0513912c818485cd94e4fbdb3944ac96fae51db632620b083f95a7ea96ef48b81b215367956581725

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0d6a6e5c7be6e228598b6f7750753575

    SHA1

    22d0f15ed304e38b58ab72ff3da2b9b3c9d087d0

    SHA256

    bf49b6e2c61180b67693c4ca2a9978735dedf5ec1404639dd4672044d14cb676

    SHA512

    1331ee44fdf1a29e5768b8dbec348962d61cbf3ac9ddfc289e5038cbe8172a3f2eb4589429cafbc4264c5c118102c975461ab4426fd8c81d419dac6233db754c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b24c7c33d0c2957d87a6a0c94a9e13bd

    SHA1

    6aa5f8cb1356867dc33d36516e804e2a31c63c76

    SHA256

    32c51d91dbd0f6c44c2d6ca75fe954fe7ac111e39f8172ac4d3dc58be1a35e15

    SHA512

    1b740b2bead179afa9819c598986774c7795879a8512a9fabf0fb60c72713f16ac837f2e4a7523591ba201b775d2136534fd205635a0605875bd0ea81954678d

  • C:\Users\Admin\AppData\Local\Temp\Cab1A55.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1B44.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b